Gov. Arnold Schwarzenegger declared a statewide drought emergency Friday, urging cities to cut their use of water 20 percent and paving the way for projects such as desalination plants and water recycling projects to bypass standard environmental reviews.

The devices could then be morphed through software controls or even human touch. Think about having the ability to squeeze your cell phone down to the size of pack of gum when it’s in your pocket, and then being able to pull it out, and stretch it to the size of a paperback book so its screen could be larger while browsing the web, for example.

Having your own hosted web domain has never been cheaper, or easier, with the vast array of free resources out there. Here are our ten favorite tools to help anyone launch and maintain their internet presence.

TapeCutter writes “After the devastating firestorm in Australia, there has been a lot of speculation in the press about the role of climate change. For the ‘pro’ argument the BBC article points to research by the CSIRO. For the ‘con’ argument they quote David Packham of Monash university, who is not alone in thinking ‘…excluding prescribed burning and fuel management has led to the highest fuel concentrations we have ever had…’ However, the DSE’s 2008 annual report states; ‘[The DSE] achieved a planned burning program of more than 156,000 hectares, the best result for more than a decade. The planned burning of forest undergrowth is by far the most powerful management tool available…’ I drove through Kilmore on the evening of the firestorm, and in my 50 years of living with fire I have never seen a smoke plume anything like it. It was reported to be 15 km high and creating its own lightning. There were also reports of car windscreens and engine blocks melting. So what was it that made such an unusual firestorm possible, and will it happen again?”

Reader RoundSparrow sends word of a contest, with big cash prizes, being mounted by a commercial vender of open source Open-WRT routers. You have 10 months to come up with “the most impressive User Interface/Firmware for Ubiquiti’s newly released open-source embedded wireless platform, the RouterStation.” Entries are required to have open source licensing and will all be released. First prize is 0,000, with four runners-up receiving ,000. RoundSparrow adds: “Could be built on top of existing X-WRT or LuCI OpenWRT web interfaces. OpenWRT Kamikaze 8.09 was just released. Now is perfect timing for OpenWRT to get some kick-ass interface and usability ideas. I’m not affiliated with the contest vendor.”

In the past we’ve given plenty of examples of how DRM hurts paying customers instead of the people it is meant for. Still, many software companies prefer to see their customers as potential ‘thieves’ but what they don’t realize, however, is that they are actually breeding pirates instead of stopping them.

Peace Corps Online writes “In the 1980s a deadly fungus called chytrid appeared in Central America and began moving through mountain streams, killing as many as 8 out of 10 frogs and extinguishing some species entirely. (The fungus has little effect on any other vertebrates.) Now a returned Peace Corps volunteer and her husband have opened the El Valle Amphibian Conservation Center in western Panama to house more than 600 frogs as chytrid cuts a lethal path through the region. Experts agree that the only hope of saving some of the more endangered, restricted-range species is to collect animals from remaining wild populations, establish captive breeding programs, and be prepared to conduct reintroduction projects in the future. But before reintroduction can even begin, scientists must find some way to overcome the chytrid in native habitats using vaccines, breeding for resistance, or genetic engineering of the fungus. Conservationists are budgeting for 25 years of captive breeding, long enough, they believe, to allow some response to chytrid to be found. ‘There are more species in need of rescue than there are resources to rescue them,’ says Amphibian Ark’s program director. ‘When you’re talking about insidious threats like disease or climate change, threats that can’t be mitigated in the wild, there’s simply no alternative.'”

oliphaunt writes “This week at The Legality, Tracy Frazier has an article discussing the damage that can be done by anonymous online comments. While regulars here are familiar with infamous bits of Net censorship like the Fishman Affidavit fiasco, and everyone has been an anonymous coward at least once or twice, some of you may not know about the conflict between Heide Iravani and AutoAdmit.com. Heide eventually filed a lawsuit because the first result for a Google search on her name brought up anonymous comments on AutoAdmit that accused her of carrying an STD and sleeping her way to the top of her class. The Communications Decency Act was supposed to prevent this kind of thing, but an injunction prevented it from ever being enforced and eventually the Supreme Court killed it. Should the law be changed?” The article links to a proposal from last summer in the New Jersey legislature that would institute a DMCA-like takedown regime for allegedly defamatory content posted on a Web site, and would allow aggrieved parties to demand the identity of anonymous posters without a subpoena. No indication of how that proposal fared. Also linked is a recent North Carolina proposal that would criminalize the act of defaming someone using an electronic medium. This proposal shields Web sites from liability and explicitly does not apply to anonymous speech.